{"id":"https://openalex.org/W4414518853","doi":"https://doi.org/10.1002/dac.70270","title":"Trust\u2010Aware and Optimization\u2010Driven Secure Routing in Heterogeneous Wireless Sensor Networks for Internet of Things Applications","display_name":"Trust\u2010Aware and Optimization\u2010Driven Secure Routing in Heterogeneous Wireless Sensor Networks for Internet of Things Applications","publication_year":2025,"publication_date":"2025-09-25","ids":{"openalex":"https://openalex.org/W4414518853","doi":"https://doi.org/10.1002/dac.70270"},"language":"en","primary_location":{"id":"doi:10.1002/dac.70270","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.70270","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080779599","display_name":"Prajakta Sudhirkumar Khelkar","orcid":null},"institutions":[{"id":"https://openalex.org/I83740829","display_name":"School of Visual Arts","ror":"https://ror.org/0437v2m88","country_code":"US","type":"education","lineage":["https://openalex.org/I83740829"]},{"id":"https://openalex.org/I4210153931","display_name":"D.Y. Patil University","ror":"https://ror.org/045qb5273","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210153931"]}],"countries":["IN","US"],"is_corresponding":true,"raw_author_name":"Prajakta\u00a0Sudhirkumar Khelkar","raw_affiliation_strings":["Department of Computer Engineering Vasantdada Patil Pratishthan's College of Engineering and Visual Arts, Sion  Mumbai India","Department of Computer Engineering, Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul  Navi Mumbai India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering Vasantdada Patil Pratishthan's College of Engineering and Visual Arts, Sion  Mumbai India","institution_ids":["https://openalex.org/I83740829"]},{"raw_affiliation_string":"Department of Computer Engineering, Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul  Navi Mumbai India","institution_ids":["https://openalex.org/I4210153931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042089267","display_name":"Gautam M. Borkar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153931","display_name":"D.Y. Patil University","ror":"https://ror.org/045qb5273","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210153931"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gautam\u00a0M. Borkar","raw_affiliation_strings":["Department of Information Technology Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul  Navi Mumbai India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul  Navi Mumbai India","institution_ids":["https://openalex.org/I4210153931"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080779599"],"corresponding_institution_ids":["https://openalex.org/I4210153931","https://openalex.org/I83740829"],"apc_list":{"value":3450,"currency":"USD","value_usd":3450},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32217621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"16","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.614300012588501},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5559999942779541},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5051000118255615},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5016000270843506},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.48660001158714294},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4569999873638153},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.45249998569488525},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.424699991941452},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.40720000863075256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8878999948501587},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6818000078201294},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.614300012588501},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5559999942779541},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5051000118255615},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5016000270843506},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.48660001158714294},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4569999873638153},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.45249998569488525},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.424699991941452},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.40720000863075256},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39160001277923584},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.3693999946117401},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.35120001435279846},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.34940001368522644},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.3467000126838684},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.3425999879837036},{"id":"https://openalex.org/C120317029","wikidata":"https://www.wikidata.org/wiki/Q874048","display_name":"Packet forwarding","level":3,"score":0.33880001306533813},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.32589998841285706},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.28119999170303345},{"id":"https://openalex.org/C76522221","wikidata":"https://www.wikidata.org/wiki/Q5035396","display_name":"Multipath routing","level":5,"score":0.28119999170303345},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.27489998936653137},{"id":"https://openalex.org/C196423136","wikidata":"https://www.wikidata.org/wiki/Q7209671","display_name":"Policy-based routing","level":5,"score":0.25920000672340393},{"id":"https://openalex.org/C2776955676","wikidata":"https://www.wikidata.org/wiki/Q7371623","display_name":"Hybrid routing","level":5,"score":0.2556000053882599},{"id":"https://openalex.org/C202385902","wikidata":"https://www.wikidata.org/wiki/Q1229441","display_name":"Distance-vector routing protocol","level":5,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/dac.70270","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.70270","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W3013224184","https://openalex.org/W4304806739","https://openalex.org/W4360620215","https://openalex.org/W4387639030","https://openalex.org/W4391136780","https://openalex.org/W4391362935","https://openalex.org/W4392902515","https://openalex.org/W4396711538","https://openalex.org/W4399302831","https://openalex.org/W4399703305","https://openalex.org/W4400729039","https://openalex.org/W4401201303","https://openalex.org/W4401977285","https://openalex.org/W4403674393","https://openalex.org/W4404035205","https://openalex.org/W4404708553","https://openalex.org/W4405270336","https://openalex.org/W4405429386","https://openalex.org/W4405521094","https://openalex.org/W4405719199","https://openalex.org/W4405754142","https://openalex.org/W4405854939","https://openalex.org/W4406080977","https://openalex.org/W4406151196","https://openalex.org/W4406230518","https://openalex.org/W4406295083","https://openalex.org/W4407062510","https://openalex.org/W4407307198","https://openalex.org/W4407364496","https://openalex.org/W4407373631","https://openalex.org/W4407383828"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"In":[1],"the":[2,112,157,173],"context":[3],"of":[4,178],"IoT":[5,181],"applications,":[6],"heterogeneous":[7],"Wireless":[8],"Sensor":[9],"Networks":[10],"(WSNs)":[11],"face":[12],"significant":[13,159],"challenges":[14],"related":[15],"to":[16,49,129,135,143,152],"energy":[17,53],"efficiency":[18,177],"and":[19,30,44,52,61,70,96,146,176],"secure":[20,23],"routing.":[21,104],"Traditional":[22],"routing":[24,63,71],"protocols,":[25],"although":[26],"reliant":[27],"on":[28],"encryption":[29],"decryption":[31,46],"mechanisms,":[32],"often":[33],"suffer":[34],"from":[35,127,133,141,150],"high":[36],"key":[37],"generation":[38],"times,":[39],"large":[40],"encrypted":[41],"data":[42],"sizes,":[43],"slow":[45],"speeds,":[47],"leading":[48],"performance":[50,117],"degradation":[51],"inefficiency.":[54],"This":[55],"research":[56],"proposes":[57],"a":[58,79],"novel":[59],"trust\u2010aware":[60],"energy\u2010efficient":[62],"protocol":[64],"that":[65,164],"dynamically":[66],"optimizes":[67],"node":[68],"selection":[69],"paths":[72],"in":[73,180],"adversarial":[74],"environments.":[75,182],"The":[76,161],"model":[77],"incorporates":[78],"dynamic":[80],"trust":[81],"evaluation":[82],"mechanism,":[83],"likely":[84],"point":[85],"particle":[86],"swarm":[87],"optimization":[88,169],"(LPPSO)":[89],"for":[90,101],"trustworthy":[91],"cluster":[92],"head":[93],"(CH)":[94],"selection,":[95],"streamlined":[97],"genetic":[98],"algorithm":[99],"(SGA)":[100],"adaptive,":[102],"energy\u2010aware":[103],"Experimental":[105],"results":[106],"implemented":[107],"using":[108],"MATLAB":[109],"2021a":[110],"show":[111],"proposed":[113],"approach":[114],"maintains":[115],"strong":[116],"under":[118],"attack":[119],"conditions,":[120],"with":[121,168],"packet":[122],"delivery":[123],"ratio":[124],"(PDR)":[125],"decreasing":[126],"98.5%":[128],"93.1%,":[130],"throughput":[131],"reducing":[132],"3.42":[134],"2.85":[136],"Mbps,":[137],"end\u2010to\u2010end":[138],"delay":[139],"increasing":[140],"0.3396":[142],"0.4821":[144],"ms,":[145],"network":[147],"lifetime":[148],"dropping":[149],"1200":[151],"1080":[153],"rounds\u2014wormhole":[154],"attacks":[155],"having":[156],"most":[158],"impact.":[160],"study":[162],"concludes":[163],"integrating":[165],"trust\u2010based":[166],"security":[167],"techniques":[170],"substantially":[171],"enhances":[172],"robustness,":[174],"lifetime,":[175],"WSNs":[179]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
